2020
DOI: 10.1186/s40537-019-0277-1
|View full text |Cite
|
Sign up to set email alerts
|

Anomaly detection in business processes using process mining and fuzzy association rule learning

Abstract: Many corporations worldwide use an enterprise resource planning (ERP) system to manage their business process, which continuously changes due to dynamic business requirements [1]. Because the processes run continuously, ERP produces a considerable log of processes. Manual observation will have difficulty monitoring the sizeable log, especially detecting anomalies. It needs the method that can detect anomalies in the huge log. Standard business processes are usually incorporated into standard operating procedur… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
20
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 50 publications
(20 citation statements)
references
References 19 publications
0
20
0
Order By: Relevance
“…In general, these models are based on variables (also known as predictors) that are most likely to influence the outcome [ 26 ]. Predictive models are widely applied in various applications such as weather forecasting [ 27 , 28 , 29 ], Bayesian spam filters [ 30 , 31 , 32 , 33 ], business [ 34 , 35 , 36 , 37 ], and fraud detection [ 38 , 39 , 40 ]. Predictive models typically include a machine learning algorithm that learns certain properties from a training dataset.…”
Section: Methodsmentioning
confidence: 99%
“…In general, these models are based on variables (also known as predictors) that are most likely to influence the outcome [ 26 ]. Predictive models are widely applied in various applications such as weather forecasting [ 27 , 28 , 29 ], Bayesian spam filters [ 30 , 31 , 32 , 33 ], business [ 34 , 35 , 36 , 37 ], and fraud detection [ 38 , 39 , 40 ]. Predictive models typically include a machine learning algorithm that learns certain properties from a training dataset.…”
Section: Methodsmentioning
confidence: 99%
“…Although data mining and process mining share many features, the key difference is that data mining aims to discover previously unknown and interesting patterns in the datasets, while process mining focuses on finding process relationships [28]. Thus, data mining techniques for detecting fraud are usually unsuitable for analyzing the behavior of control flow in a business process [39]. However, process mining can be used to assess the control flow of a business process [56] and to analyze process performance, event sequence, and process roles [57].…”
Section: Methodsmentioning
confidence: 99%
“…[7], [30], [31] Process mining anomaly techniques include control flow analysis, role resource analysis, throughput time analysis, and decision point analysis [39]. The study undertaken by [4], which proposed a process mining method for PBF detection, suggested the concept "1 + 5 + 1", which includes (1) log preparation; (5) (a) log analysis, (b) performance analysis, (c) social analysis, (d) conformance analysis, (e) process analysis; and (1) refocusing and iteration.…”
Section: Process Map (Aggregated Data)mentioning
confidence: 99%
“…Monitoring business processes from a massive event log brings a challenge related to Big Data. Process mining is a discipline of gathering the event log and processing the log into a process model for monitoring, including capturing anomalies [5,6] or bottlenecks [7]. The technique of constructing a process model by process mining is called process discovery.…”
Section: Introductionmentioning
confidence: 99%